SlideShare a Scribd company logo
1 of 16
1
Use of
Telecommunications
&
Network
2
SCHOOL DISTRICT OF CLAY COUNTY
TELECOMMUNICATIONS NETWORK
OVERVIEW
1. SDCC provides opportunity for students to expand
learning.
2. Opportunity =
3. Goal of school Internet
a. Resource sharing
b. Accessing outside information
c. Research
d. Encouraging technological innovation
e. Worldwide communication
•Question: Compared to other schools around the country and
the world, what do you think our school would be like if we did
not have access to the Internet?
3
INTERNET RESOURCES
4. Students will have access to:
a. Worldwide electronic mail
communication.
b. Global information and news.
c. Public domain and shareware computer
software.
d. Educational discussion groups.
e. Access to many university libraries and
other libraries.
4
INTERNET WARNING
5. Some materials on the Internet are not of educational value
while at school.
6. This material may not be suitable for students.
7. The instructor will monitor student use of the Internet to
prevent students from accessing unsuitable material.
5
USER GUIDELINES
8. Internet access is through an association of government,
regional & state networks.
9. School district wants the network to be used in a ,
efficient, ethical and legal manner.
10. Operation of Internet relies on proper conduct of the users.
6
USER GUIDELINES Continued
11. If you violate, your account will be terminated.
12. Serious violations may result in school disciplinary action or
legal action.
13. A signature indicates that the user has read and understands.
7
Acceptable Use
14. Internet use must support education and research.
15. Users are encouraged to take advantage of the network’s
functions:
a. electronic mail
b. conferences
c. bulletin boards
d. databases
e. access to the Internet
8
Privileges
16. Use of Internet = privilege
17. Inappropriate use = no privilege
Question: Why do you think using the Internet at school is a
privilege?
9
“Netiquette”
18. Abide by the rules of network etiquette.
19. Be polite.
20. Do not use vulgar or obscene language.
21. Do not reveal your address or phone number or those of
others.
22. Electronic mail is not guaranteed to be private.
23. Do not disrupt the network, the data, or other users.
10
24. Unacceptable Uses of Network
a. Violating student or staff rights to privacy.
b. Using the Internet without application of common sense.
c. Using profanity, obscenity, or other language which may be
offensive to another user.
d. Sending or accessing pornographic text and/or graphics.
e. Unauthorized games.
f. Sending or receiving copyrighted materials.
g. Reporting personal communications without the author’s prior
consent.
Question: What could happen to a person, whose private
information such as a name, address and phone number,
given out over the Internet without their permission?
11
Unacceptable Uses of Network Continued
h. Using for commercial activities, product advertisement, or
financial gain.
i. Knowingly transmitting viruses.
j. Spam.
k. Chain letters.
l. Unauthorized solicitations for goods and services.
m. Posting personal views .
n. Unauthorized streaming video or music – this ties up the
bandwidth & slows down the network.
Question: What would happen to the school Internet if a virus was sent
in to infect the system?
12
Warranties
25. SDCC makes no warranties.
26. SDCC will not be responsible for damages or loss of data.
27. SDCC will not be responsible for the accuracy or quality of
information obtain on network.
28. Inappropriate Internet sites should be reported to teacher
immediately.
13
Security
29. Security is a high priority.
30. Do not show or identify the problem to others.
31. Do not use another individual’s account.
32. Attempts to log on as another user will result in cancellation of
your privileges.
33. Security risk users will be denied network access.
14
Vandalism
34. Vandalism = privileges cancellation and/or disciplinary action.
35. Vandalism is a malicious attempt to harm or destroy data of
another user, Internet, or other networks.
36. Includes creation or uploading computer viruses on the
Internet or host site.
37. Degrading or disrupting system performance is a crime under
state and federal law.
15
Sponsors
38. Teachers are to make sure students:
a. Know how to use the Internet correctly &
b. Know what happens if they don’t!
16
The End

More Related Content

What's hot

labComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outlinelabComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outline
Swapnil Sawale
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6
RochelleStansfield
 
Chapter 12 ppt for module 5
Chapter 12 ppt for module 5Chapter 12 ppt for module 5
Chapter 12 ppt for module 5
sragasa
 
Ms. Fanelli's US History Class
Ms. Fanelli's US History ClassMs. Fanelli's US History Class
Ms. Fanelli's US History Class
Brittany
 

What's hot (18)

AUP
AUPAUP
AUP
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
labComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outlinelabComputer lab rules and ethics concept outline
labComputer lab rules and ethics concept outline
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6Cybersafety rules 2010 years 3 to 6
Cybersafety rules 2010 years 3 to 6
 
AUP
AUPAUP
AUP
 
Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)Issue with Internet in college (Computer Security and Cyber Law)
Issue with Internet in college (Computer Security and Cyber Law)
 
Top 10 uses of the internet in teaching
Top 10 uses of the internet in teachingTop 10 uses of the internet in teaching
Top 10 uses of the internet in teaching
 
Copyrightvictorialopezrevisedforch1&2
Copyrightvictorialopezrevisedforch1&2Copyrightvictorialopezrevisedforch1&2
Copyrightvictorialopezrevisedforch1&2
 
Chapter 12 ppt for module 5
Chapter 12 ppt for module 5Chapter 12 ppt for module 5
Chapter 12 ppt for module 5
 
Laptop Orientation Year 10 St Mary's Wollongong
Laptop Orientation Year 10 St Mary's WollongongLaptop Orientation Year 10 St Mary's Wollongong
Laptop Orientation Year 10 St Mary's Wollongong
 
Aralanet Iteach V1
Aralanet Iteach V1Aralanet Iteach V1
Aralanet Iteach V1
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Ms. Fanelli's US History Class
Ms. Fanelli's US History ClassMs. Fanelli's US History Class
Ms. Fanelli's US History Class
 
Wicked Good Resource Youre Probably Not Using
Wicked Good Resource Youre Probably Not UsingWicked Good Resource Youre Probably Not Using
Wicked Good Resource Youre Probably Not Using
 

Viewers also liked (8)

Conclusión
ConclusiónConclusión
Conclusión
 
Print
PrintPrint
Print
 
The Interactive Charter
The Interactive CharterThe Interactive Charter
The Interactive Charter
 
Presentation md
Presentation mdPresentation md
Presentation md
 
Ready for a challenge
Ready for a challengeReady for a challenge
Ready for a challenge
 
Detecting Signals from Real-time Social Web
Detecting Signals from Real-time Social Web Detecting Signals from Real-time Social Web
Detecting Signals from Real-time Social Web
 
Fried Images
Fried ImagesFried Images
Fried Images
 
конспект уроку
конспект урокуконспект уроку
конспект уроку
 

Similar to Aup lesson for vll students

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
vlbrown
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
dlwadsworth
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
vlbrown
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
jessa_delingon
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
leslieannpt
 

Similar to Aup lesson for vll students (20)

Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Aup lesson for cbs students
Aup lesson for cbs studentsAup lesson for cbs students
Aup lesson for cbs students
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
computer ethics for educators
computer ethics for educatorscomputer ethics for educators
computer ethics for educators
 
Law 483 cyberethics
Law 483 cyberethicsLaw 483 cyberethics
Law 483 cyberethics
 
CMS Technology acceptable use policy
CMS Technology acceptable use policyCMS Technology acceptable use policy
CMS Technology acceptable use policy
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 
Draft Computer Acceptable Use Policy
Draft Computer Acceptable Use PolicyDraft Computer Acceptable Use Policy
Draft Computer Acceptable Use Policy
 
Internet policy[1]
Internet policy[1]Internet policy[1]
Internet policy[1]
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
INTERNET.pptx
 INTERNET.pptx INTERNET.pptx
INTERNET.pptx
 
SM INTERNET.pptx
SM INTERNET.pptxSM INTERNET.pptx
SM INTERNET.pptx
 
Security
SecuritySecurity
Security
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Cybersafety yr0 3
Cybersafety yr0 3Cybersafety yr0 3
Cybersafety yr0 3
 

More from dlwadsworth

Acbsi ppt - project 1 sample
Acbsi   ppt - project 1 sampleAcbsi   ppt - project 1 sample
Acbsi ppt - project 1 sample
dlwadsworth
 
Html assignment 2 template
Html assignment 2 templateHtml assignment 2 template
Html assignment 2 template
dlwadsworth
 
ACBSI Syllabus - Sheridan
ACBSI Syllabus - SheridanACBSI Syllabus - Sheridan
ACBSI Syllabus - Sheridan
dlwadsworth
 
Acbsi syllabus - Wadsworth
Acbsi syllabus - WadsworthAcbsi syllabus - Wadsworth
Acbsi syllabus - Wadsworth
dlwadsworth
 
Odysseyware Orientation - Wadsworth
Odysseyware Orientation   - WadsworthOdysseyware Orientation   - Wadsworth
Odysseyware Orientation - Wadsworth
dlwadsworth
 
Unit 12 sec 2-programming design
Unit 12 sec 2-programming designUnit 12 sec 2-programming design
Unit 12 sec 2-programming design
dlwadsworth
 
Unit 12 section 1 - computer programming
Unit 12   section 1 - computer programmingUnit 12   section 1 - computer programming
Unit 12 section 1 - computer programming
dlwadsworth
 
Sam2010 getting started ppt
Sam2010 getting started pptSam2010 getting started ppt
Sam2010 getting started ppt
dlwadsworth
 
Cbs welcome to week 1 ppt
Cbs   welcome to week 1 pptCbs   welcome to week 1 ppt
Cbs welcome to week 1 ppt
dlwadsworth
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
dlwadsworth
 

More from dlwadsworth (20)

Ymca presentation
Ymca presentationYmca presentation
Ymca presentation
 
It 2nd segment pace chart
It 2nd segment   pace chartIt 2nd segment   pace chart
It 2nd segment pace chart
 
IT 1st segment Traditional pace chart
IT 1st segment  Traditional pace chartIT 1st segment  Traditional pace chart
IT 1st segment Traditional pace chart
 
Acbsi pacing chart 2nd semester -14-15
Acbsi pacing chart   2nd semester -14-15Acbsi pacing chart   2nd semester -14-15
Acbsi pacing chart 2nd semester -14-15
 
Segment 1 exam review ppt
Segment 1   exam review pptSegment 1   exam review ppt
Segment 1 exam review ppt
 
Pace chart 1st segment - traditional - ccc
Pace chart   1st segment - traditional - cccPace chart   1st segment - traditional - ccc
Pace chart 1st segment - traditional - ccc
 
Pace chart 2nd segment - computing for college and careers
Pace chart   2nd segment - computing for college and careersPace chart   2nd segment - computing for college and careers
Pace chart 2nd segment - computing for college and careers
 
Acbsi orientation ppt
Acbsi   orientation pptAcbsi   orientation ppt
Acbsi orientation ppt
 
Acbsi ppt - project 1 sample
Acbsi   ppt - project 1 sampleAcbsi   ppt - project 1 sample
Acbsi ppt - project 1 sample
 
Html assignment 2 template
Html assignment 2 templateHtml assignment 2 template
Html assignment 2 template
 
ACBSI Syllabus - Sheridan
ACBSI Syllabus - SheridanACBSI Syllabus - Sheridan
ACBSI Syllabus - Sheridan
 
Acbsi syllabus - Wadsworth
Acbsi syllabus - WadsworthAcbsi syllabus - Wadsworth
Acbsi syllabus - Wadsworth
 
What is a will
What is a willWhat is a will
What is a will
 
Odysseyware Orientation - Wadsworth
Odysseyware Orientation   - WadsworthOdysseyware Orientation   - Wadsworth
Odysseyware Orientation - Wadsworth
 
Unit 12 sec 2-programming design
Unit 12 sec 2-programming designUnit 12 sec 2-programming design
Unit 12 sec 2-programming design
 
Unit 12 section 1 - computer programming
Unit 12   section 1 - computer programmingUnit 12   section 1 - computer programming
Unit 12 section 1 - computer programming
 
Sam2010 getting started ppt
Sam2010 getting started pptSam2010 getting started ppt
Sam2010 getting started ppt
 
Cbs welcome to week 1 ppt
Cbs   welcome to week 1 pptCbs   welcome to week 1 ppt
Cbs welcome to week 1 ppt
 
Aup study guide for ppt pdf
Aup study guide for ppt  pdfAup study guide for ppt  pdf
Aup study guide for ppt pdf
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Aup lesson for vll students

  • 2. 2 SCHOOL DISTRICT OF CLAY COUNTY TELECOMMUNICATIONS NETWORK OVERVIEW 1. SDCC provides opportunity for students to expand learning. 2. Opportunity = 3. Goal of school Internet a. Resource sharing b. Accessing outside information c. Research d. Encouraging technological innovation e. Worldwide communication •Question: Compared to other schools around the country and the world, what do you think our school would be like if we did not have access to the Internet?
  • 3. 3 INTERNET RESOURCES 4. Students will have access to: a. Worldwide electronic mail communication. b. Global information and news. c. Public domain and shareware computer software. d. Educational discussion groups. e. Access to many university libraries and other libraries.
  • 4. 4 INTERNET WARNING 5. Some materials on the Internet are not of educational value while at school. 6. This material may not be suitable for students. 7. The instructor will monitor student use of the Internet to prevent students from accessing unsuitable material.
  • 5. 5 USER GUIDELINES 8. Internet access is through an association of government, regional & state networks. 9. School district wants the network to be used in a , efficient, ethical and legal manner. 10. Operation of Internet relies on proper conduct of the users.
  • 6. 6 USER GUIDELINES Continued 11. If you violate, your account will be terminated. 12. Serious violations may result in school disciplinary action or legal action. 13. A signature indicates that the user has read and understands.
  • 7. 7 Acceptable Use 14. Internet use must support education and research. 15. Users are encouraged to take advantage of the network’s functions: a. electronic mail b. conferences c. bulletin boards d. databases e. access to the Internet
  • 8. 8 Privileges 16. Use of Internet = privilege 17. Inappropriate use = no privilege Question: Why do you think using the Internet at school is a privilege?
  • 9. 9 “Netiquette” 18. Abide by the rules of network etiquette. 19. Be polite. 20. Do not use vulgar or obscene language. 21. Do not reveal your address or phone number or those of others. 22. Electronic mail is not guaranteed to be private. 23. Do not disrupt the network, the data, or other users.
  • 10. 10 24. Unacceptable Uses of Network a. Violating student or staff rights to privacy. b. Using the Internet without application of common sense. c. Using profanity, obscenity, or other language which may be offensive to another user. d. Sending or accessing pornographic text and/or graphics. e. Unauthorized games. f. Sending or receiving copyrighted materials. g. Reporting personal communications without the author’s prior consent. Question: What could happen to a person, whose private information such as a name, address and phone number, given out over the Internet without their permission?
  • 11. 11 Unacceptable Uses of Network Continued h. Using for commercial activities, product advertisement, or financial gain. i. Knowingly transmitting viruses. j. Spam. k. Chain letters. l. Unauthorized solicitations for goods and services. m. Posting personal views . n. Unauthorized streaming video or music – this ties up the bandwidth & slows down the network. Question: What would happen to the school Internet if a virus was sent in to infect the system?
  • 12. 12 Warranties 25. SDCC makes no warranties. 26. SDCC will not be responsible for damages or loss of data. 27. SDCC will not be responsible for the accuracy or quality of information obtain on network. 28. Inappropriate Internet sites should be reported to teacher immediately.
  • 13. 13 Security 29. Security is a high priority. 30. Do not show or identify the problem to others. 31. Do not use another individual’s account. 32. Attempts to log on as another user will result in cancellation of your privileges. 33. Security risk users will be denied network access.
  • 14. 14 Vandalism 34. Vandalism = privileges cancellation and/or disciplinary action. 35. Vandalism is a malicious attempt to harm or destroy data of another user, Internet, or other networks. 36. Includes creation or uploading computer viruses on the Internet or host site. 37. Degrading or disrupting system performance is a crime under state and federal law.
  • 15. 15 Sponsors 38. Teachers are to make sure students: a. Know how to use the Internet correctly & b. Know what happens if they don’t!